New threat: AI technology is learning to 'listen' and steal your passwords and data

2023, Aug 30

Artificial intelligence (AI) is becoming increasingly sophisticated, and this is also posing serious threats to information security. According to a new study by researchers at Cornell University (USA), hackers can use AI to steal user data with just a single keystroke.
Researchers have developed an AI algorithm that can analyze users' keystroke patterns to identify passwords and other sensitive data. This algorithm has up to 95% accuracy, even when users try to hide their keystrokes.
The results of this study show that users need to increase their security awareness and use stronger security measures to protect their personal data.
How does AI eavesdrop on the keyboard?
Researchers at Cornell University (USA) have discovered a new security threat: hackers can use artificial intelligence (AI) to steal user data with just a tap. keys.
To do this, hackers can install malware on the victim's device with a microphone, such as a laptop or smartphone. The malware collects data from the victim's keystrokes and feeds them to an AI model.
This AI model will use the device's microphone to listen and repeat those keystrokes. In this way, hackers can obtain the victim's passwords, credit card numbers and other sensitive personal information.
Researchers tested one such AI model and found up to 95% accuracy. This model can analyze users' keystroke patterns to identify passwords and other sensitive data.
Steps to stay safe
1. Use a password manager. A password manager will generate and store strong and unique passwords for all your accounts. This eliminates the need to remember multiple passwords and reduces the possibility of AI detecting or predicting keystrokes.
2.Install good anti-virus software on all your devices. Antivirus software will help you protect your device from malware that could install software that records your keystrokes.
3. Be careful when using public Wi-Fi. Public Wi-Fi is often not as secure as home or business Wi-Fi. When using public Wi-Fi, you should avoid accessing sensitive websites or applications, such as bank accounts or email.

News Related

Jul 30, 2025

Change iPhone privacy settings for better security

The iPhone comes with a host of powerful security features that you can customize to protect your personal information and increase your internet safety. However, with so many options scattered across different menus, it can be difficult to know which settings are really necessary. This guide will
Jul 30, 2025

The best way to store passwords securely

How to Secure Your Passwords: Comparing MethodsPasswords have been used by humans for a long time as a basic security measure. However, while they are useful, they are not a perfect solution. The best way to manage your passwords depends on your habits, your level of tech savvy, and the number of
Jul 30, 2025

Official Announcement: RICE VPN for macOS is Coming Soon!

We are pleased to announce: VPNRice – the leading secure VPN application – is now officially available on macOS.After months of research and development, VPNRice for macOS was born with the goal of bringing Apple computer users a secure, fast and absolutely private connection
Jul 30, 2025

How to get virtual phone number

Virtual phone numbers rely on an internet connection instead of traditional phone infrastructure. So you don’t need a SIM card (Subscriber Identity Module), a separate device, or be tied to a fixed location. There are many ways to get a virtual phone number, but the quickest and easiest way
Jul 30, 2025

Protecting User Information When Using VPNRice

In the digital age, protecting personal information online is of utmost importance. VPNRice, with a commitment to providing safety and security to users, has taken many measures to ensure that personal information is not leaked or compromised. This article will detail how VPNRice protects user
Jul 30, 2025

GPS spoofing: what it is and how to avoid it

GPS spoofing is the act of sending out a fake GPS signal to trick the receiving device into believing that it is in a different location than it actually is. This method is often used for harmless purposes such as gaming or protecting privacy. However, in some cases, it can be exploited to commit
Jul 30, 2025

VPN for Telegram: Stay Anonymous and Connected Anytime, Anywhere

Platforms like Telegram have become essential for secure communication, news, and community engagement. But in many countries, including India and parts of the Middle East, Telegram is often restricted, limited, or blocked entirely. That’s where VPN RICE comes in.If you’re looking for a
Jul 30, 2025

Signs of email scams and how to handle them

Every day, cybercriminals send millions of malicious emails that attempt to trick people into giving them access to their login credentials, assets, and even their identities. However, by recognizing the signs of a scam early, you can stop it before it happens.This guide will show you the signs of
Jul 30, 2025

Fake IP Address: What It Is and How to Get One

An Internet Protocol (IP) address is an essential part of how your device connects to the internet. However, it also has its downsides—including privacy risks and restricted access to content. Your IP address can be used to track your online activity, and websites often use it to block you
Jul 30, 2025

How to Test and Improve Your VPN Speed ​​Most Accurately

VPN (Virtual Private Network) not only helps protect your privacy but also allows you to access region-restricted content. However, VPN speed is a key factor in determining your experience. In this article, we will learn how to test VPN speed and ways to improve it effectively.1. Why test VPN
Exclusive Offer
Get your Free 30 days access